You are in charge of the security for a computer network for a shopping center. There are many stores in the shopping center and all of the stores provide both in-site and online shopping to their customers. The shopping center has several requirements and constraints for the computer system: - The data and user account system is based on servers running on-site at the shopping center as the center has a very strict data protection policy prohibiting the use of cloud-based servers. - Customers should be able to access the network remotely (off-site) as well as locally (on-site) for shopping. - There are at least three types of users, namely, administrators, staff and customers. Different users have differing levels of access. - Users need access in different ways, using tablets, mobile phones, desktop computers and laptops. You are trying to convince the shopping center’s managers to spend more money and staff time on computer security. You have decided that you are going to try to paint them a frightening picture of the computer security landscape. You should (1) identify THREE threats and (2) explain what might happen if the center’s network is attacked in these ways. You should then (3) suggest what they should do to defend against these specific attacks and why these defense mechanisms work.

icon
Related questions
Question

You are in charge of the security for a computer network for a shopping center. There are many stores in the shopping center and all of the stores provide both in-site and online shopping to their customers. The shopping center has several requirements and constraints for the computer system:

- The data and user account system is based on servers running on-site at the shopping center as the center has a very strict data protection policy prohibiting the use of cloud-based servers.

- Customers should be able to access the network remotely (off-site) as well as locally (on-site) for shopping.

- There are at least three types of users, namely, administrators, staff and customers. Different users have differing levels of access.

- Users need access in different ways, using tablets, mobile phones, desktop computers and laptops.

You are trying to convince the shopping center’s managers to spend more money and staff time on computer security. You have decided that you are going to try to paint them a frightening picture of the computer security landscape.

You should (1) identify THREE threats and (2) explain what might happen if the center’s network is attacked in these ways. You should then (3) suggest what they should do to defend against these specific attacks and why these defense mechanisms work.

Expert Solution
steps

Step by step

Solved in 5 steps

Blurred answer
Knowledge Booster
Web Host concepts
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, cybersecurity and related others by exploring similar questions and additional content below.